Date: 30 Nov 2004 04:02:25 -0000
From: Mandrake Linux Security Team <security@linux-mandrake.com.>
To: [email protected]Subject: MDKSA-2004:137-1 - Updated libxpm4 packages correct issues with previous update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: libxpm4
Advisory ID: MDKSA-2004:137-1
Date: November 29th, 2004
Original Advisory Date: January 22nd, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
The previous libxpm4 update had a linking error that resulted in a missing
s_popen symbol error running applications dependant on the library. In
addition, the file path checking in the security updates prevented some
applications, like gimp-2.0 from being able to save xpm format images.
Updated packages are patched to correct all these issues.
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
35c897c12a36e38cceb1774f890e91e9 10.0/RPMS/libxpm4-3.4k-27.3.100mdk.i586.rpm
ff399d6be76862ac2b61ca5bab76941a 10.0/RPMS/libxpm4-devel-3.4k-27.3.100mdk.i586.rpm
d673354abbc067dbc454481e11c0e110 10.0/SRPMS/xpm-3.4k-27.3.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
0df2d07d04793600e2ede34733c18700 amd64/10.0/RPMS/lib64xpm4-3.4k-27.3.100mdk.amd64.rpm
c699a6fa6400dd3dfd803b129392b398 amd64/10.0/RPMS/lib64xpm4-devel-3.4k-27.3.100mdk.amd64.rpm
d673354abbc067dbc454481e11c0e110 amd64/10.0/SRPMS/xpm-3.4k-27.3.100mdk.src.rpm
Mandrakelinux 10.1:
e00bdfcecbf0d09dc6758a2dbce6dc9b 10.1/RPMS/libxpm4-3.4k-28.2.101mdk.i586.rpm
6eb66944f25e92ca7d3d7f76cfa6b577 10.1/RPMS/libxpm4-devel-3.4k-28.2.101mdk.i586.rpm
562eaedc47c52d4952d27b023bcd49f2 10.1/SRPMS/xpm-3.4k-28.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
3b17a7a58c7345520e63fad235a47a3f x86_64/10.1/RPMS/lib64xpm4-3.4k-28.2.101mdk.x86_64.rpm
18a71ab6716293e66668bf627c24e2a8 x86_64/10.1/RPMS/lib64xpm4-devel-3.4k-28.2.101mdk.x86_64.rpm
562eaedc47c52d4952d27b023bcd49f2 x86_64/10.1/SRPMS/xpm-3.4k-28.2.101mdk.src.rpm
Corporate Server 2.1:
a2910d380ebe04ca8ee624e218b7a9b7 corporate/2.1/RPMS/libxpm4-3.4k-21.3.C21mdk.i586.rpm
28d0c7868d8b3231751a3f1d97e47725 corporate/2.1/RPMS/libxpm4-devel-3.4k-21.3.C21mdk.i586.rpm
873a7591285599bdb062d1c26eca3f72 corporate/2.1/SRPMS/xpm-3.4k-21.3.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
adc64096557a3934aad0d149918efdae x86_64/corporate/2.1/RPMS/libxpm4-3.4k-21.3.C21mdk.x86_64.rpm
1a2ab77f1754f1a60781d1e2a8306c47 x86_64/corporate/2.1/RPMS/libxpm4-devel-3.4k-21.3.C21mdk.x86_64.rpm
873a7591285599bdb062d1c26eca3f72 x86_64/corporate/2.1/SRPMS/xpm-3.4k-21.3.C21mdk.src.rpm
Mandrakelinux 9.2:
a7c7c5441b22e690f9be0258db581052 9.2/RPMS/libxpm4-3.4k-27.3.92mdk.i586.rpm
e950cdc935e75873a4f81a1cc5d6a812 9.2/RPMS/libxpm4-devel-3.4k-27.3.92mdk.i586.rpm
7d53ee8024d4d586ec50ba0281987fd4 9.2/SRPMS/xpm-3.4k-27.3.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
47b3147cf8ca6fc1fae0d267569b6a15 amd64/9.2/RPMS/lib64xpm4-3.4k-27.3.92mdk.amd64.rpm
09e3d45094730c2da539437922abb2b6 amd64/9.2/RPMS/lib64xpm4-devel-3.4k-27.3.92mdk.amd64.rpm
7d53ee8024d4d586ec50ba0281987fd4 amd64/9.2/SRPMS/xpm-3.4k-27.3.92mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFBq/DRmqjQ0CJFipgRAq78AJ48v/E3iNjk/8L78YPkyioCdaIOjgCgsbq8
LtO02uqj6C3RXckXagkllZg=
=ObCZ
-----END PGP SIGNATURE-----